CERTIFIED-IN-CYBERSECURITY · Question #351
CERTIFIED-IN-CYBERSECURITY Question #351: Real Exam Question with Answer & Explanation
The correct answer is B: Man-in-the-Middle Attack. In a Man-in-the-Middle (MitM) attack, an attacker intercepts and potentially alters the communication between two parties without their knowledge (see ISC2 Study Guide, Module 2, under Types of Threats). This attack is used to access sensitive information, such as passwords and f
Question
Which type of network attack involves an attacker intercepting and potentially altering the communication between two parties without their knowledge?
Options
- ASQL Injection Attack
- BMan-in-the-Middle Attack
- CPhishing Attack
- DDistributed Denial-of-Service Attack
Explanation
In a Man-in-the-Middle (MitM) attack, an attacker intercepts and potentially alters the communication between two parties without their knowledge (see ISC2 Study Guide, Module 2, under Types of Threats). This attack is used to access sensitive information, such as passwords and financial data. The other options are not related to a MitM attack. Distributed Denial-of- Service (DDoS) attack is an attack in which an attacker attempts to make a service or network resource unavailable by flooding it with requests. SQL Injection attack is an attack in which an attacker injects malicious code into a vulnerable web application to gain access to sensitive information. Phishing is an attack in which an attacker attempts to trick a user into providing sensitive information by sending them an email or a link to a malicious website.
Topics
Community Discussion
No community discussion yet for this question.